Wireless Ethernet – Enabling the Internet of Things?

By: Brook Svoboda on January 16th, 2014

Print/Save as PDF

Wireless Ethernet – Enabling the Internet of Things?

IP  |  wireless  |  FIPS140-2  |  IoT  |  internet of things  |  Fips140

describe the image

The Internet of Things (IoT).


By now most IT professionals are aware of what this term means and its huge potential impact on the world of technology over the next 20 years. A revolution that is in the very early part of what promises to be a huge growth curve.  Whether it’s called the “Industrial Internet” as GE coined, or the “Internet of Everything” according to Cisco. Whatever name you want to give it, it’s big. Very very big. Estimates of how big are growing year over year with the latest projections coming in at over 20 Trillion dollars.


So, what is the Internet of Things? Simply put, it is the vision that every electronic “thing” on the planet will be network enabled and therefore remotely monitored or controlled by the owner(s) of that “thing.” Everything from toasters and refrigerators, to thermostats and industrial PLC devices; if it has circuitry, it will have an IP interface. If it has an IP interface it will be transmitted over the Internet. If it’s transmitted over the Internet, it will need to be secure. And so the revolution goes.


At AvaLAN wireless we have been directly involved in connecting remote IP devices (things) back to an Internet location with our wireless Ethernet radios for the past 10 years. Ethernet is the most standard IP interface, which is why AvaLAN has led with Ethernet enabled radios since our inception back in 2004.  The wide variety of “things” we have connected to the internet include Digital Billboards, IP cameras, IP access control devices, IP PLC devices, VOIP, Sensor networks, and the list goes on.


Recognizing the growing need to make these connections more and more secure AvaLAN has developed leading edge hardware encryption modules that can be used in conjunction with our Ethernet radios to deliver FIPS140-2 Level 2 encrypted data from the “thing” to the Internet to the monitoring source.